Digital forensics and the DSAR effect

被引:0
|
作者
Kahvedžić D. [1 ]
机构
[1] ProSearch,
关键词
Data subject access request; Digital forensics; DSAR;
D O I
10.1007/s12027-021-00651-z
中图分类号
学科分类号
摘要
The digital forensics field has seen much evolution over the last thirty years. Methods for data extraction and protocols for accuracy and admissibility are the cornerstones on which the field is based. Recently these protocols have been used for responses to data subject access requests (DSARs). The cost to an organisation of servicing DSARs can run into millions of Euro per year. Every organisation working with EU citizens is affected. Their far-reaching scope, cost and the penalties for non-compliance have stimulated the development of solutions addressing this regulatory requirement. This paper charts the evolution of the DSAR process and how improvements have in turn led to the advancement of the digital forensics field itself. © 2021, @ ERA.
引用
收藏
页码:59 / 73
页数:14
相关论文
共 50 条
  • [31] Digital forensics and measurement science
    Irons, Alastair
    MEASUREMENT & CONTROL, 2010, 43 (08): : 238 - 242
  • [32] Taxonomy of Challenges for Digital Forensics
    Karie, Nickson M.
    Venter, Hein S.
    JOURNAL OF FORENSIC SCIENCES, 2015, 60 (04) : 885 - 893
  • [33] Digital Face Forgery and the Role of Digital Forensics
    Tampubolon, Manotar
    INTERNATIONAL JOURNAL FOR THE SEMIOTICS OF LAW-REVUE INTERNATIONALE DE SEMIOTIQUE JURIDIQUE, 2024, 37 (03): : 753 - 767
  • [34] Digital Archaeology: The Art and Science of Digital Forensics
    Polymeropoulou, Panagiota
    INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 45 - 45
  • [35] Digital Image Forgery - A threaten to Digital Forensics
    Nampoothiri, Parameswaran, V
    Sugitha, N.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [36] Digital Forensics in VoIP networks
    Francois, Jerome
    State, Radu
    Engel, Thomas
    Festor, Olivier
    2010 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2010,
  • [37] A virtual digital forensics laboratory
    Craiger, Philip
    Burke, Paul
    Marberry, Christopher
    Pollitt, Mark
    ADVANCES IN DIGITAL FORENSICS IV, 2008, 285 : 357 - 365
  • [38] A digital video tampering forensics scheme based on forensics hash
    Wei, Hui
    Yang, Gao-Bo
    Xia, Ming
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (12): : 2934 - 2941
  • [39] Cloud computing and digital forensics
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2012, 9 (02) : 69 - 70
  • [40] Technical reporting in digital forensics
    Horsman, Graeme
    JOURNAL OF FORENSIC SCIENCES, 2022, 67 (06) : 2458 - 2468